Implementing, Managing and Maintaining a Network Infrastructure

(CTU-IT327.AB1)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Networking Concepts

  • The Purpose of Reference Models
  • The OSI Model
  • The TCP/IP Stack
  • Physical and Virtual Appliances
  • Applications and Functions
  • Network Functions Virtualization (NFV)
  • Cloud Networking Components
  • Deployment Models
  • Service Models
  • Key Cloud Concepts
  • Ports and Protocols
  • Internet Protocol (IP) Types
  • Traffic Types
  • Wireless
  • Copper and Fiber Media and Connectors
  • Multiplexing in Fiber-Optic Networks
  • Defining a Network
  • Network Types and Characteristics
  • Networks Defined Based on Resource Location
  • Networks Defined by Topology
  • The Three-Tier Hierarchical Model
  • Binary Numbering
  • IPv4 Addressing
  • Assigning IPv4 Addresses
  • Subnetting
  • SDN and SD-WAN
  • Virtual Extensible Local Area Network (VXLAN)
  • Zero Trust Architecture (ZTA)
  • SASE and SSE
  • Infrastructure as Code (IaC)
  • IP Version 6
2

Network Implementation

  • Routing
  • Sources of Routing Information
  • Routing Protocol Characteristics
  • Routing Protocol Examples
  • Address Translation
  • First Hop Redundancy Protocol (FHRP)
  • Principles of Ethernet
  • Ethernet Switch Features
  • Introducing Wireless LANs
  • Deploying Wireless LANs
  • Securing Wireless LANs
  • Important Installation Implications
  • Power
  • Environmental Factors
3

Network Operations

  • Documentation
  • Processes and Procedures
  • Network Monitoring Methods
  • Monitoring Solutions
  • High Availability
  • Real-World Case Study: Network Design
  • Dynamic Addressing
  • Name Resolution
  • Time Protocols
  • Virtual Private Networks (VPNs)
  • Other Network Access Technologies
  • Authentication and Authorization Considerations
  • In-Band vs. Out-of-Band Management
4

Network Security

  • Core Security Concepts
  • Authentication Methods
  • Risk Management and SIEM
  • Physical Security
  • Audits and Regulatory Compliance
  • Technology-Based Attacks
  • Social Engineering Attacks
  • Other Miscellaneous Attacks
  • Device Hardening
  • Network Access Control (NAC)
  • Other Network Security Features
5

Network Troubleshooting

  • Troubleshooting Basics
  • Specifications and Limitations
  • Common Cable Issues
  • Common Interface Issues
  • Common Hardware Issues
  • Common Tools
  • Considerations for General Network Troubleshooting
  • Common Network Service Issues
  • Network Performance Considerations
  • Wireless Performance Considerations
  • Other Wireless Considerations
  • Common Wireless Issues
  • Wireless Network Troubleshooting
  • Software Tools
  • Command-Line Tools
  • Basic Networking Device Commands
  • Hardware Tools

1

Networking Concepts

  • Viewing the IPv4 Header
  • Analyzing the Structure of TCP and UDP Segments
  • Connecting Systems to the Internet Through a Firewall Router
  • Implementing Intrusion Detection and Prevention
  • Configuring a Basic Switch
  • Configuring a Firewall
  • Configuring a Proxy Server
  • Creating an ALB in AWS
  • Configuring a Router
  • Creating a Virtual Switch
  • Creating a Virtual Network in Azure
  • Creating a VPC in AWS
  • Creating a Network Firewall in AWS
  • Creating a Network ACL
  • Creating a NAT Gateway
  • Creating a VPC Network
  • Creating a VPN Connection
  • Understanding HTTP/HTTPS
  • Exploiting SMTP
  • Connecting to a Remote Computer Using the Remote Desktop Connection
  • Understanding ICMP
  • Configuring GRE Tunnels
  • Configuring IPSec
  • Working with a Mobile Hotspot
  • Connecting to an Ethernet Network
  • Reconnecting to an Ethernet Network
  • Providing Remote Internet Access Using Analog Modem
  • Connecting Fiber Optic Cables
  • Establishing an Internet Connection Between Two Switches Using a Media Converter
  • Exploring a Single Location in a Lab
  • Connecting Devices in a Peer-To-Peer Architecture
  • Connecting Devices in a Mesh Topology
  • Exploring APIPA and Loopback Addresses
  • Configuring an IPv4 Address
  • Configuring an IP Address in Linux
  • Configuring IPv6 on a Router
  • Configuring an IPv6 Address
  • Configuring Stateless and Stateful DHCPv6
2

Network Implementation

  • Configuring Static Routing
  • Configuring EIGRP
  • Configuring OSPF
  • Configuring BGP
  • Configuring Network Address Translation
  • Configuring HSRP
  • Configuring the Speed and Duplex Settings of a Network Interface
  • Enabling Jumbo Frame Support
  • Configuring Speed, Duplex, and Description on a Switch
  • Configuring an Access Port
  • Viewing the Default Status of the Interfaces on a Switch
  • Connecting to a VoIP
  • Observing the STP Modes
  • Configuring VLAN and Trunking
  • Investigating STP Loop Prevention
  • Powering a VoIP Phone Using PoE Injector
  • Configuring PortFast and Rapid Spanning Tree
  • Configuring a BPDU Guard on a Switch Port
  • Creating a VLAN and Placing a Switch Port into It
  • Configuring a Loop Guard on a Switch Port
  • Configuring NIC Teaming
  • Configuring EtherChannel
  • Connecting to a Cable Modem
  • Creating a Home Wireless Network
  • Configuring Autonomous Access Points
  • Implementing a SOHO Network
  • Connecting an iPhone to a Laptop via Bluetooth
  • Mounting and Stacking Switches in a Server Rack
  • Providing Cooling and Ventilation to a Motherboard
3

Network Operations

  • Installing the IPAM Feature
  • Viewing and Exporting Event Logs
  • Configuring Syslog and Observing the Log Settings
  • Monitoring the System's Performance Using Performance Monitor
  • Backing Up Files
  • Creating a Restore Point
  • Creating Redundant Storage
  • Creating a Local Backup
  • Restoring Files
  • Configuring DHCP on a Router
  • Configuring SLAAC
  • Configuring a DNS Server
  • Configuring Zone Transfers
  • Viewing and Creating a Record Type
  • Connecting to a DSL Network
  • Examining DNS Entries
  • Configuring Multi-stratum NTP
  • Configuring a VPN Connection on an iPad
  • Creating a Site-to-Site VPN Connection
  • Configuring an SSH Server on a Linux System
4

Network Security

  • Examining PKI Certificates
  • Examining a Self-Signed Certificate
  • Adding a Digital Certificate
  • Creating Asymmetric Key Pairs
  • Understanding Symmetric Encryption
  • Creating a Demilitarized Zone
  • Using Honeypot
  • Configuring the RADIUS Server
  • Implementing Physical Security
  • Spoofing a MAC Address
  • Defending Against IP Spoofing
  • Cracking Passwords Using Cain and Abel
  • Configuring DHCP Snooping
  • Performing ARP Spoofing
  • Simulating a DoS Attack
  • Using Anti-phishing Tools
  • Using the SET Tool
  • Disabling Unnecessary Services in Windows
  • Setting Up a Password Policy
  • Strengthening iPad Security
5

Network Troubleshooting

  • Connecting Patch Panel Cables
  • Troubleshooting IP Addressing Issues
  • Troubleshooting Switching Issues
  • Using the Protocol Analyzer Tool
  • Using Command Line Tools
  • Understanding Networking and Network Diagnostics Command Line Tools
  • Generating and Examining the ARP Packets
  • Using the ping and tracert Commands
  • Examining Port Numbers
  • Using Networking Device Commands
  • Testing an RJ-45 Cable Using a Cable Tester
  • Using a Visual Fault Locator
  • Using a Network Tap

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top